Static | ZeroBOX

PE Compile Time

2021-09-13 04:58:11

PE Imphash

202fa14f574c71c2f95878e40a79322d

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000121f7 0x00012200 5.84850944289
.data 0x00014000 0x00000268 0x00000200 4.15286502649
.idata 0x00015000 0x00000962 0x00000a00 5.08451330423
.CRT 0x00016000 0x00000008 0x00000200 0.114463381259
.reloc 0x00017000 0x00000408 0x00000600 5.01272469642

Imports

Library KERNEL32.dll:
0x415028 OpenProcess
0x41502c GetTickCount
0x415030 GetModuleHandleA
0x415034 GetProcAddress
0x415038 LoadLibraryA
0x41503c lstrcmpW
0x415040 lstrlenW
0x41504c Process32FirstW
0x415050 Process32NextW
0x415054 CreateFileW
0x415058 WriteFile
0x41506c lstrlenA
0x415070 GetCommandLineW
0x415074 FindClose
0x415078 FindFirstFileW
0x41507c FindNextFileW
0x415080 GetFileSizeEx
0x415084 GetCurrentProcess
0x415088 ReadFile
0x41508c SetFileAttributesW
0x415090 SetFilePointerEx
0x415094 WaitForSingleObject
0x415098 CreateMutexA
0x4150a0 GetCurrentProcessId
0x4150a4 ExitProcess
0x4150a8 CreateThread
0x4150ac ExitThread
0x4150b4 GetSystemInfo
0x4150b8 lstrcmpiW
0x4150bc lstrcpyW
0x4150c0 lstrcatW
0x4150c4 OpenMutexA
0x4150c8 MoveFileExW
0x4150cc WideCharToMultiByte
0x4150d0 HeapAlloc
0x4150d4 HeapFree
0x4150d8 GetProcessHeap
0x4150dc ReleaseSemaphore
0x4150e0 CreateSemaphoreA
0x4150e4 TerminateProcess
0x4150e8 Sleep
0x4150ec GetLastError
0x4150f0 CloseHandle
0x4150f8 GetDriveTypeW
0x4150fc FindVolumeClose
0x415100 FindNextVolumeW
0x415104 GetLogicalDrives
0x415108 FindFirstVolumeW
Library USER32.dll:
0x415154 wsprintfA
Library ADVAPI32.dll:
0x415004 OpenSCManagerA
0x41500c ControlService
0x415010 CloseServiceHandle
0x415018 CryptReleaseContext
0x41501c CryptGenRandom
0x415020 OpenServiceA
Library SHELL32.dll:
0x415144 SHEmptyRecycleBinA
0x415148 CommandLineToArgvW
0x41514c ShellExecuteW
Library NETAPI32.dll:
0x415124 NetShareEnum
0x415128 NetApiBufferFree
Library RstrtMgr.DLL:
0x415130 RmGetList
0x415134 RmStartSession
0x415138 RmEndSession
0x41513c RmRegisterResources
Library MPR.dll:
0x415110 WNetCloseEnum
0x415114 WNetEnumResourceW
0x415118 WNetOpenEnumW
0x41511c WNetGetConnectionW

!This program cannot be run in DOS mode.
`.data
.idata
@.reloc
memtas
mepocs
sophos
backup
GxCIMgr
DefWatch
ccEvtMgr
ccSetMgr
SavRoam
RTVscan
QBFCService
QBIDPService
Intuit.QuickBooks.FCS
QBCFMonitorService
YooBackup
zhudongfangyu
sophos
stc_raw_agent
VSNAPVSS
VeeamTransportSvc
VeeamDeploymentService
VeeamNFSSvc
PDVFSService
BackupExecVSSProvider
BackupExecAgentAccelerator
BackupExecAgentBrowser
BackupExecDiveciMediaService
BackupExecJobEngine
BackupExecManagementService
BackupExecRPCService
AcrSch2Svc
AcronisAgent
CASAD2DWebSvc
CAARCUpdateSvc
IsWow64Process
kernel32.dll
kernel32.dll
Wow64DisableWow64FsRedirection
kernel32.dll
Wow64RevertWow64FsRedirection
, Error Code:
Can't OpenProcess
ATTENTION!
Don't worry, you can return all your files!
All your files like photos, databases, documents and other important are encrypted with strongest encryption and unique key.
The only method of recovering files is to purchase decrypt tool and unique key for you Delta Plus 2.3.
This software will decrypt all your encrypted files.
What guarantees you have?
Payment can be made in Bitcoin only.
Contact: decryptdelta@gmail.com
Bitcoin Address: 3JG36KY6abZTnHBdQCon1hheC3Wa2bdyqs
1. Decoding cost
The cost of decryption is $6500 dollars USD. We receive payment only in BITCOINS. (Bitcoin is a form of digital currency)
Discount 50% available if you contact us first 72 hours, that's price for you is $3250 dollars USD.
2. Attention!
Do not rename encrypted files.
Do not try to decrypt your data using third party software, it may cause permanent data loss.
Do not trust anyone! Only we have keys to your files! Without this keys restore your data is impossible.
3. Free decryption as guarantee
You can send us up to 1 file for free decryption.
Size of file must be less than 1 Mb (non archived). We don`t decrypt for test DATABASE, XLS and other important files. Remember this.
4. Decryption process:
To decrypt the files, transfer money to our bitcoin wallet number: "3JG36KY6abZTnHBdQCon1hheC3Wa2bdyqs". As we receive the money we will send you:
1. Decryption program.
2. Detailed instruction for decryption.
3. And individual keys for decrypting your files.
5. The process of buying bitcoins:
The easiest way to buy bitcoins: https://bitfy.app/
https://localbitcoins.com/
https://www.bitpanda.com/
https://paxful.com/
https://www.abra.com/
IMPORTANT! Don`t use coinbase! it take more than 2 week to make coinbase verification. P.S. The easiest way to buy bitcoins in CHINA: https://www.huobi.com/ https://www.bitoex.com/
Can't RmGetList
Can't RmRegisterResources
Can't RmStartSession
Can't open file after killHolder
Can't MoveFileExW
Can't FindFirstFileW
Can't FindFirstFileW
DoYouWantToHaveSexWithCuongDong
DoYouWantToHaveSexWithCuongDong
AQLwH'
.rdata
.rdata$zzzdbg
.text$di
.text$mn
.idata$5
.idata$2
.idata$3
.idata$4
.idata$6
.CRT$XCU
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
GetDriveTypeW
GetVolumePathNamesForVolumeNameW
CloseHandle
GetLastError
GetCurrentProcess
TerminateProcess
OpenProcess
GetTickCount
GetModuleHandleA
GetProcAddress
LoadLibraryA
lstrcmpW
lstrlenW
SetVolumeMountPointW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CreateFileW
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
lstrlenA
GetCommandLineW
FindClose
FindFirstFileW
FindNextFileW
GetFileSizeEx
GetLogicalDrives
ReadFile
SetFileAttributesW
SetFilePointerEx
WaitForSingleObject
CreateMutexA
WaitForMultipleObjects
GetCurrentProcessId
ExitProcess
CreateThread
ExitThread
SetProcessShutdownParameters
GetSystemInfo
lstrcmpiW
lstrcpyW
lstrcatW
OpenMutexA
MoveFileExW
WideCharToMultiByte
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
CreateSemaphoreA
KERNEL32.dll
wsprintfA
USER32.dll
CryptAcquireContextW
CloseServiceHandle
ControlService
EnumDependentServicesA
OpenSCManagerA
OpenServiceA
QueryServiceStatusEx
CryptReleaseContext
CryptGenRandom
ADVAPI32.dll
ShellExecuteW
CommandLineToArgvW
SHEmptyRecycleBinA
SHELL32.dll
NetShareEnum
NetApiBufferFree
NETAPI32.dll
RmStartSession
RmEndSession
RmRegisterResources
RmGetList
RstrtMgr.DLL
WNetGetConnectionW
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
MPR.dll
5$5+52595@5G5N5
6'686o6
7(7.767@7t7
7&848t8
9(9<9R9h9
:2:<:b:
==/=:=A=N=T=[=k=v=}=
0"0A0V0h0
121D1Q1p1
2/2W2i2o2y2
33)373<3F3W3
444E4N4_4h4y4
5$565^5p5v5
5,616;6L6
7717Y7k7q7{7
:!:.:?:D:Q:d:
<;<H<i<{<
=(=2=B=Z=
?A?N?W?a?y?
;0W0z0
:7=J=l=
444c7v7
>"?2?P?h?~?
0 0$0(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(14181<1@1D1H1L1P1T1X1\1`1d1h1l1p1t1x1|1
sql.exe
oracle.exe
ocssd.exe
dbsnmp.exe
synctime.exe
agntsvc.exe
isqlplussvc.exe
xfssvccon.exe
mydesktopservice.exe
ocautoupds.exe
encsvc.exe
firefox.exe
tbirdconfig.exe
mydesktopqos.exe
ocomm.exe
dbeng50.exe
sqbcoreservice.exe
excel.exe
infopath.exe
msaccess.exe
mspub.exe
onenote.exe
outlook.exe
powerpnt.exe
steam.exe
thebat.exe
thunderbird.exe
visio.exe
winword.exe
wordpad.exe
notepad.exe
/c vssadmin.exe delete shadows /all /quiet
cmd.exe
AppData
Windows
Windows.old
Tor Browser
Internet Explorer
Google
Opera Software
Mozilla
Mozilla Firefox
$Recycle.Bin
ProgramData
All Users
autorun.inf
boot.ini
bootfont.bin
bootsect.bak
bootmgr
bootmgr.efi
bootmgfw.efi
desktop.ini
iconcache.db
ntuser.dat
ntuser.dat.log
ntuser.ini
thumbs.db
Program Files
Program Files (x86)
#recycle
.delta
\Help Restore Your Files.txt
Help Restore Your Files.txt
.delta
ADMIN$
shares
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Generic.Ransom.Babuk.A.2792F39D
FireEye Generic.mg.093f098e70cc57a1
CAT-QuickHeal Clean
ALYac Generic.Ransom.Babuk.A.2792F39D
Cylance Unsafe
VIPRE Clean
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005782fe1 )
BitDefender Generic.Ransom.Babuk.A.2792F39D
K7GW Trojan ( 005782fe1 )
CrowdStrike win/malicious_confidence_70% (D)
BitDefenderTheta Gen:NN.ZexaF.34142.euW@a0wVUsc
Cyren Clean
Symantec Ransom.Babuk
ESET-NOD32 a variant of Win32/Filecoder.Babyk.A
Baidu Clean
APEX Malicious
Paloalto Clean
ClamAV Win.Ransomware.Maze-7473772-0
Kaspersky UDS:DangerousObject.Multi.Generic
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Ransom.Babuk!1.D7A0 (CLASSIC)
Ad-Aware Generic.Ransom.Babuk.A.2792F39D
TACHYON Clean
Emsisoft Trojan.FileCoder (A)
Comodo Clean
F-Secure Clean
DrWeb Clean
Zillya Clean
TrendMicro Ransom.Win32.BABUK.SMRD1
McAfee-GW-Edition BehavesLike.Win32.Generic.lm
CMC Clean
Sophos ML/PE-A
Ikarus Clean
Jiangmin Clean
Webroot Clean
Avira HEUR/AGEN.1142556
Antiy-AVL Clean
Kingsoft Clean
Microsoft Ransom:Win32/Babuk.MAK!MTB
Gridinsoft Clean
Arcabit Generic.Ransom.Babuk.A.2792F39D
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Ransom.Win32.Generic
GData Generic.Ransom.Babuk.A.2792F39D
Cynet Malicious (score: 100)
AhnLab-V3 Ransomware/Win.Babuk.R441290
Acronis suspicious
McAfee GenericRXNS-AS!093F098E70CC
MAX malware (ai score=85)
VBA32 BScope.TrojanRansom.Crypmod
Malwarebytes Malware.AI.3103134655
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall Ransom.Win32.BABUK.SMRD1
Tencent Clean
Yandex Clean
SentinelOne Static AI - Malicious PE
eGambit Clean
Fortinet W32/FilecoderProt.F183!tr.ransom
AVG Win32:Malware-gen
Avast Win32:Malware-gen
MaxSecure Trojan.Malware.121218.susgen
No IRMA results available.